Identity Verification System
The quest for human identification has led to the development of several practices and technologies. Such early practices involve using names, tribal marks, ID cards, and, more recently, biometrics technology. Biometrics verification that identifies a person based on some physiological or behavioral characteristics has mainly been restricted to government and financial institutions due to the high cost of the system, while the more widely used identification document – the ID card, has its various limitations. To associate data with particular individuals, it is necessary that an effective and easily accessible identification scheme be established. This work proposes an identification scheme for mobile devices. Card details can thus be matched or compared to information stored in the database held by the card issuer. The primary technologies used in this research work are server (standalone) side application technologies (vb.NET, mcore library, COM component), MySQL as database, and object-oriented analysis and design (OOAD) as the design methodology.
1.0: Background of the Study
The need to adopt strategies for verifying people’s identities in our world today cannot be over-emphasized. It is a standard practice to issue a disclaimer on people no longer associated with a particular organization to alert them to the risk of subsequent transactions with the person(s), but this information sometimes gets to the intended audience when some fraudulent acts might have been perpetrated. We currently live in an era when everyone should be vigilant and conscious of the identity of persons in his/her environment. Recurring security challenges and the menace of false identity claims in our schools and society today call for a holistic approach from stakeholders in overcoming the ugly trend. Identity theft and fraudulent document production are reaching alarming levels worldwide. Human identification is a delicate notion that requires optimum consideration at all levels of management. Incidences of fake identity abound in the country. It becomes complicated when the task of checkmating people’s identities is left to the law enforcement agencies, especially at times when identity fraud claims abound. This work thus highlights and recommends the need to develop a primary verification tool that is readily accessible to people.
1.1 Statement of the problem
1. The university’s ID card (identity card) is the standard identification document used in the school. It’s been known that this could be forged
2. Parents, relatives, and guardians cannot independently verify the status of their children.
3. Unavailability of a verification system makes it difficult for stakeholders to authenticate ID cards.
4. The national appeal of reporting suspicious movements becomes challenging to achieve in the University community when there exist limited means of verifying the identity.
1.2 Objectives of the study
The objectives of this study is to achieve the following;
• Provide a medium on which students’ and staff identity can be verified.
• Ensure a faster resolution of identity claims.
• Use of a mobile platform that is popular for verification.
1.3 Significance of the study
The study reveals the importance of developing a system that verifies the identity of the people we live with. Prevailing economic, social, and security realities in our world today demand that we know and could verify basic information about the individuals we associate with. The recent call for a presidential candidate to withdraw his nomination for not possessing the essential academic qualification and identity fraud cases that abound in the country can be attributed to the limited and rigorous verification process. This work will greatly benefit society as it proposes a cost-effective verification tool.
 Fabunmi, M., and Isah, E.A., “Determinant Factors for Planning Students Records Retrieval in Nigerian Universities.” Revitalization of African Higher Education. Ibadan, Herp-Network, 2008 Available herp-net.org/Revitalization-of-African-Higher-Education/Chapter29.pdf Viewed Dec.5, 2014
 Olotu, B., “Important Notice to Students” 15 May-2014 [Online school.com.ng/aaua/news/27079/aaua-important-notice-to-students-on-identity-cards.html. [Accessed July 15, 2014].
 Jain, A.K., Ross, A., and Pankanti, S., “Biometrics: a Tool for Information Security” IEEE Transactions on Information Forensics and Security, Vol.1, 2006 biometrics.cse.msu.edu/Publications/GeneralBiometric s/JainRossPankanti BiometricsInfoSec TIFS06.pdf
 Roger Clarke, “Human Identification in Information Systems: Management Challenges and Public Policy Issues.” Xamax Consultancy Company Ltd. rogerclarke.com/DV/HumanID.html. Viewed 14th May 2014
 wikipedia.org/wiki/Identity document
 AkinyemiAkinlabi, “Nigerian National Identification Card –Costs and Benefits.” Available at gamji.com/article6000/NEWS6202.ht ml Viewed 5th Nov 2014
 Everest Ahaefule, “How National Identification Management System Will Stimulate Development” Available punchng.com/business/clo se-up-on-ict/how-national-identification-management-system-will-stimulate-development/ Viewed 18th July, 2014
Copyright © 2023 Author(s) retain the copyright of this article.
This article is published under the terms of the Creative Commons Attribution License 4.0
If you like this article, see others like it:
- Implementation of an Academic Research Paper Plagiarism Checker System
- The Effect of Computerization of Library on Students Academy Performance
- Design and Implementation of Emerging Wireless Technology
- A Critical Analysis of the Impact of Twitter Ban on Government Transparency and Accountability
- The Effect of Information Systems on the Performance of E-commerce